Secure Cloud Adoption gives you a high level insight into cloud and cloud security.
Contains all slides and exercises from my highly regarded Cloud Security Workshop.
Understand How To Get More And Quicker Benefit From Cloud Computing In Your Company With Less Risk
- Learn why cloud computing is here to stay
- Understand how cloud characteristics drive business value and risk
- Identify the important steps in any cloud adoption process
- Understand the most essential technology and cloud architecture components
- Recognize which services are more valuable and less risky
- Bring all the steps together in your plan
- Overcome resistance to cloud initiatives
- Learn how to temper overly enthusiastic people
Your Instructor
I am one of the most experienced independent cloud trainers worldwide. Since 2011 I am focussed on developing and delivering cloud computing training, mainly related to business value and business risk of cloud computing.
I have delivered the CCSK cloud security training over 150 times myself in more than a dozen countries. On top of that I developed and delivered more cloud training in more countries.
My background is broad. I worked as a researcher and instructor at Twente University, as a project leader and consultant at EDS and an internet provider, and as an IT strategy, IT risk and digital infrastructures consultant at Deloitte.
Course Curriculum
-
StartIntroduction and scope
-
StartCloud Models
-
StartBusiness benefits
-
StartThreat modelling
-
StartShared responsibilities
-
StartShared responsibilities exercise
-
StartSecuring cloud platforms
-
StartCloud Provider Evaluation
-
StartSecuring cloud workloads
-
StartSecurity Scaling
-
StartFree access to "Understanding CCSK"
-
StartWhat's next?